CCSK Additional Resources
This CCSK section provides additional resources and articles to support each CSA domain.
Many articles are related to AWS Cloud practices and other best products in the market.
Article: Cloud Security Complexity
link to article
Build Fast, Secure Well: Automate DevSecOps and Secure Your Cloud
link to article
Coming soon
Article: AWS Cloud Migration Readiness Guide
link to article
Article: AWS Migration Whitepaper
link to article
Article: Digital Transformation Checklist
link to article
Article: NIST_Cybersecurity_Framework_CSF
link to article
Article: AWS_CAF_Security_Perspective
link to article
Article: AWS-Security-Pillar
link to article
Article: AWS_Data_Classification
link to article
Article: AWS_Security_at_Scale_Governance_in_AWS_Whitepaper
link to article
Article: AWS_Security_at_Scale_Logging_in_AWS_Whitepaper
link to article
Article: Top 20 Critical Controls for Cloud ERP Customers (June 2019)
link to article
Article: Best Practices for Mitigating Risks Virtual Environments
link to article
Article: Learn the security functions and requirements (e.g. network, virtualization, data and management security) needed to protect the data in the cloud.
link to article
Article: Security Position Paper Network Function Virtualization
link to article
Article: Securosis Future of Security Operations
link to article
Article: DDoS white paper
link to article
Article: Intro_to_AWS_Security
link to article
Article: Intro_Security_Practices
link to article
Article: Security_Compute_Services_Whitepaper
link to article
Article: Security_Application_Services_Whitepaper
link to article
Article: CASB 101 – How Cloud Access Security Brokers Can Make Your Data More Secure
link to article
Article: AWS Cloud- Proactive Security & Forensic Readiness five-part best practice
link to article
Article: Cloud Storage Types
link to article
Article: Security_Storage_Services_Whitepaper
link to article
Article: Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks
link to article
Article: Securing Your File Transfer in the Cloud
link to article
Article: URL filtering
link to article
Article: What is object storage?
link to article
Article: Securosis Building Container Security Program
link to article
Article: Database Activity Monitoring (DAM)
link to article
Article: Security_Database_Services_Whitepaper
link to article
Article: AWS_Securing_Data_at_Rest_with_Encryption
link to article
Article: Security_Database_Services_Whitepaper
link to article
Article: CSA Top threats to cloud computing deep dive
link to article
Article: Top Threats – NIST
link to article
Article: Top Threats – OTGv4
link to article
Article: Top Threats – OWASP 10-2017
link to article
Article: Learn the security functions and requirements (e.g. network, virtualization, data and management security) needed to protect the data in the cloud.
link to article
Article: AWS_Security_Best_Practices
link to article
Article: AWS_Security_Checklist
link to article